Received: by 2002:a05:6358:e9c4:b0:b2:91dc:71ab with SMTP id hc4csp6877873rwb; Wed, 10 Aug 2022 02:47:47 -0700 (PDT) X-Google-Smtp-Source: AA6agR656fNjHas/uxdcPemjG66RXOVk7erWXwSvYJJp7dIvZeSrV2iCD2WTna7+CqbfR6Q21Ssc X-Received: by 2002:a05:6a00:23d0:b0:52e:74be:d52 with SMTP id g16-20020a056a0023d000b0052e74be0d52mr26743357pfc.62.1660124867736; Wed, 10 Aug 2022 02:47:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1660124867; cv=none; d=google.com; s=arc-20160816; b=rx3GnREkY/3Q/cvrRgaqltZ9JlIEVNrPsN46d24Vg39+M7ztTBk9zekVZ0DCMDb0Zt CHN+cs4BHw8NXo47km9aCre9az4tmJku6d5iJp9oB2ypqKs0YCe429+IU5EjWzFKqIBc RhnWUgbMvKLBs3VqvwryRugEZcO3hy8kGQUyDR7BLsclF/Q9C+78AbMTLQEh3oOjSgR3 san6n02Av9ox+oJoxBZyrklfrOMi9N9feo979vtMYb7sihCo+JLl0ZLU9tcCm00lI5zE Eur0IqcJhd/gEY9TaGee0qsVX2MFA5oO0PLHac3Y3R+MkkrRGxJPxhFOnxsyTBmJ6yY9 Abbg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:user-agent:message-id:in-reply-to :date:references:subject:cc:to:from:dkim-signature; bh=REovcAc0irul9Otc+DHjiNYKhgyWXaWXdC+TCEPnc/U=; b=SGVn8r54aE//SZZyHffH99eLaNWgCRhT3oOA0I0BIOHBz9uWJhsPNbCVHGvPC7MBdy ig3Kfw1juQLnScd0WZlCoeafxf+nxEYMhMRn3wp9UDmNnfge7RSRElPEJDdYJqwzlqtv 15Y2nwm2UkmJXDRiCd+0x8mi3kEWBODhU+Dsmw6sNr5QG2yfgvxdKT46QLiMZR6V68to u8KLnvFKNd7MUxJzkGPkINOcQetR8fiERje587eP8ohVTa3ueKB0+xZhexe9nfE6Ei/y JgeZPLZ2a0dbuDQF2azujgQ0gaGuVw6396+hwl5YjabBNL1UDS9YVDhdSZk4lfH/oWWs cu6w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=IFu79W3O; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id b18-20020a056a000a9200b005254ad64f73si2481706pfl.102.2022.08.10.02.47.34; Wed, 10 Aug 2022 02:47:47 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=IFu79W3O; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232073AbiHJJ0p (ORCPT + 99 others); Wed, 10 Aug 2022 05:26:45 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53150 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232072AbiHJJ0m (ORCPT ); Wed, 10 Aug 2022 05:26:42 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id C57426053B for ; Wed, 10 Aug 2022 02:26:37 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1660123596; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=REovcAc0irul9Otc+DHjiNYKhgyWXaWXdC+TCEPnc/U=; b=IFu79W3O9X4h8A0hQntdnluZjtYEYAINmzoLY69O10ZQ+uC0mcyxG0sSUfR7bECdl78MKs 6nOV+BPZnNiyfbWo8VPTPJ2rsora3RzjzgKUDb3DuNBELkJqWIXY/rX6ELhIyXq4dZJRR6 nkqclZc+h6GVALpFmPHhoPBji1qIXpU= Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-638-V-viqhV2OyKPRUEj6RfDPg-1; Wed, 10 Aug 2022 05:26:33 -0400 X-MC-Unique: V-viqhV2OyKPRUEj6RfDPg-1 Received: from smtp.corp.redhat.com (int-mx01.intmail.prod.int.rdu2.redhat.com [10.11.54.1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 7707118A6585; Wed, 10 Aug 2022 09:26:33 +0000 (UTC) Received: from oldenburg.str.redhat.com (unknown [10.39.192.75]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 2352A400DFD7; Wed, 10 Aug 2022 09:26:31 +0000 (UTC) From: Florian Weimer To: David Howells Cc: linux-fsdevel@vger.kernel.org, Ian Kent , Alexander Viro , Christian Brauner , linux-api@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [RFC][PATCH] uapi: Remove the inclusion of linux/mount.h from uapi/linux/fs.h References: <163410.1659964655@warthog.procyon.org.uk> Date: Wed, 10 Aug 2022 11:26:30 +0200 In-Reply-To: <163410.1659964655@warthog.procyon.org.uk> (David Howells's message of "Mon, 08 Aug 2022 14:17:35 +0100") Message-ID: <87zggce9fd.fsf@oldenburg.str.redhat.com> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/27.2 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain X-Scanned-By: MIMEDefang 2.84 on 10.11.54.1 X-Spam-Status: No, score=-2.7 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org * David Howells: > We're seeing issues in autofs and xfstests whereby linux/mount.h (the UAPI > version) as included indirectly by linux/fs.h is conflicting with > sys/mount.h (there's a struct and an enum). > > Would it be possible to just remove the #include from linux/fs.h (as patch > below) and rely on those hopefully few things that need mount flags that don't > use the glibc header for them working around it by configuration? Wasn't split from relatively recently, and userspace is probably using to get the mount flag definitions? In retrospect, it would have been better to add the new fsmount stuff to a separate header file, so that we could include that easily from on the glibc side. Adhemerval posted a glibc patch to fake that (for recent compilers): [PATCH] linux: Fix sys/mount.h usage with kernel headers I think it should work reliably, so that's probably the direction we are going to move in. We'll backport this to 2.36, and distributions will pick it up. Thanks, Florian